CCMA's blog

This is a professional blog of Check Point Certified Master Architect (CCMA). It does not represent position of my current employer.

Monday, June 16, 2014

R77.10 MDM clean installation fails in the lab

›
From time to time I am hearing complains about failing Multi Domain Managemet lab installations with R77.10. Basically, after seemingly c...
15 comments:
Sunday, May 25, 2014

FW module is lost after reboot, analysis

›
Some of my colleague have experiences a strange failure on Gaia-based Check Point appliances lately. On certain point, after reboot, FW m...
5 comments:
Thursday, May 15, 2014

Notes about sync redundancy

›
During the last Advanced Check Point Troubleshooting course I have been asked about best practices to build sync redundancy with Gaia. T...
4 comments:
Saturday, April 12, 2014

Kernel debug flags revealed

›
As I have been advised yesterday night, Check Point has published another extremely interesting document: Kernel Debug Flags . It is a comp...
3 comments:
Wednesday, April 2, 2014

Forwarding Management logs from CMAs to CLMs

›
If you only log your GWs to CLMs and not to CMAs, it is not exactly convenient having Management audit logs still residing on CMAs. ...
Friday, March 28, 2014

iPad Document security - follow up

›
Some people from Check Point are still sending me private messages concerning my post about document security iPad app . Some even try to m...
3 comments:
Thursday, March 27, 2014

Transparent Kerberos SSO with multiple GWs

›
Check Point Identity Awareness is a neat feature, especially with browser based transparent SSO authentication. It is also a challenging on...
2 comments:
‹
›
Home
View web version

About Me

My photo
Valeri Loukine
Techniques, methods and tools described in this blog may require advanced expertise to use. Some information presented here may be incorrect or incomplete. Use it on your own risk. Author is not liable in case of any damage. For resolution of your technical issues related to Check Point Software Technologies products and systems always follow standard support procedures.
View my complete profile
Powered by Blogger.